Sciweavers

1477 search results - page 59 / 296
» Token flow control
Sort
View
113
Voted
ISCC
2003
IEEE
15 years 8 months ago
Controlling Bursts in Best-effort Routers for Flow Isolation
In today’s Internet a user can be adversely affected by other users that overload the router. To address this problem, routers need to provide flow isolation. In this paper, we...
Miguel A. Ruiz-Sánchez, Walid Dabbous
139
Voted
CORR
2007
Springer
98views Education» more  CORR 2007»
15 years 3 months ago
Normalisation Control in Deep Inference Via Atomic Flows
We introduce ‘atomic flows’: they are graphs obtained from derivations by tracing atom occurrences and forgetting the logical structure. We study simple manipulations of atomi...
Alessio Guglielmi, Tom Gundersen
142
Voted
ESOP
2011
Springer
14 years 7 months ago
Typing Local Control and State Using Flow Analysis
Programs written in scripting languages employ idioms that confound conventional type systems. In this paper, we highlight one important set of related idioms: the use of local con...
Arjun Guha, Claudiu Saftoiu, Shriram Krishnamurthi
126
Voted
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 7 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
106
Voted
ACCV
2009
Springer
15 years 10 months ago
Crowd Flow Characterization with Optimal Control Theory
Abstract. Analyzing the crowd dynamics from video sequences is an open challenge in computer vision. Under a high crowd density assumption, we characterize the dynamics of the crow...
Pierre Allain, Nicolas Courty, Thomas Corpetti